For the packet capture files of Global Defense Matched, Zone Attack Matched or Zone Anomaly Matched, you can obtain attack sources by tracing a packet capture file. Suspicious IP address can also be blacklisted for effective attack defense.
The packet capture task of Global Defense Matched, Zone Attack Matched or Zone Anomaly Matched has been created and enabled.
of a packet capture file in the Operation column to trace attack sources.
Parameter |
Description |
|---|---|
Source IP Address |
Indicates the source IP address of the attacker. |
Protocol Type |
Indicates the protocol type of attack packets. |
Destination Port |
Indicates the destination port of attack packets. |
Number of Attack Packets |
Indicates the number of packets sent during attacks. |
Blacklist is enabled for Zones. Attack sources are traced for packets captured after Zone Attack Matched and Zone Anomaly Matched are enabled. Then the attack sources can be blacklisted.